Thank you, Quinn. The use case here is that we provide VPN client (TLS-based) to users who connect to their own servers. Some of the server certificates may not be properly generated (e.g. self-signed, lacking SAN, wrong key usages etc.).
The VPN client performs standard TLS verification in the first place but allows ignoring certificate errors. It is now a deal-breaker if some errors can't be ignored.
Topic:
App & System Services
SubTopic:
Networking
Tags: